An unsigned-library issue was discovered in ProlinOS through 2.4.161.8859R. This OS requires installed applications and all system binaries to be signed either by the manufacturer or by the Point Of Sale application developer and distributor. The signature is a 2048-byte RSA signature verified in the kernel prior to ELF execution. Shared libraries, however, do not need to be signed, and they are not verified. An attacker may execute a custom binary by compiling it as a shared object and loading it via LD_PRELOAD.
References
Link | Resource |
---|---|
https://git.lsd.cat/g/pax-pwn | Exploit Third Party Advisory |
https://git.lsd.cat/g/pax-pwn | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:22
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.lsd.cat/g/pax-pwn - Exploit, Third Party Advisory |
Information
Published : 2020-11-02 21:15
Updated : 2024-11-21 05:22
NVD link : CVE-2020-28045
Mitre link : CVE-2020-28045
CVE.ORG link : CVE-2020-28045
JSON object : View
Products Affected
pax
- prolinos
CWE
CWE-347
Improper Verification of Cryptographic Signature